-
2
-
-
77949604431
-
SNIPER: A data mining methodology for fiscal fraud detection
-
Basta, S., F. Giannotti, G. Manco, D. Pedreschi, and L. Spisanti. 2009. SNIPER: A data mining methodology for fiscal fraud detection. Mathematics for Finance and Economy, special issue of ERCIM News 78:27-28.
-
(2009)
Mathematics for Finance and Economy, Special Issue of ERCIM News
, vol.78
, pp. 27-28
-
-
Basta, S.1
Giannotti, F.2
Manco, G.3
Pedreschi, D.4
Spisanti, L.5
-
3
-
-
0001907967
-
Support Vector Machines: Hype or Hallelujah?
-
Bennett, K. P., and C. Campbell. 2000. Support vector machines: Hype or hallelujah? SIGKDD Explorations 2 (2): 1-13.
-
(2000)
SIGKDD Explorations
, vol.2
, Issue.2
, pp. 1-13
-
-
Bennett, K.P.1
Campbell, C.2
-
4
-
-
85125896304
-
Arguments, stories and criminal evidence: A formal hybrid theory
-
Dordrecht, The Netherlands: Springer
-
Bex, F. 2011. Arguments, stories and criminal evidence: A formal hybrid theory, Springer Law and Philosophy Library, 92. Dordrecht, The Netherlands: Springer.
-
(2011)
Springer Law and Philosophy Library
, vol.92
-
-
Bex, F.1
-
5
-
-
84937343759
-
Exploratory network visualization: Simultaneous display of actor status and connections
-
Brandes, U., J. Raab, and D. Wagner. 2001. Exploratory network visualization: Simultaneous display of actor status and connections. Journal of Social Structure 2 (4). http://www.cmu.edu/joss/content/articles/volume2/ BrandesRaabWagner.html.
-
(2001)
Journal of Social Structure
, vol.2
, pp. 4
-
-
Brandes, U.1
Raab, J.2
Wagner, D.3
-
6
-
-
20344365949
-
The analysis of social networks
-
ed. M. Hardy and A. Bryman London: SAGE
-
Breiger, R. L. 2004. The Analysis of Social Networks. In Handbook of Data Analysis, ed. M. Hardy and A. Bryman, 505-526. London: SAGE.
-
(2004)
Handbook of Data Analysis
, pp. 505-526
-
-
Breiger, R.L.1
-
7
-
-
79951822517
-
Learning with support vector machines
-
Published online in .pdf in February 2011 by Morgan and Claypool in the United States . doi:==10.2200=S00324ED1V01Y201102AIM010
-
Campbell, C., and Y. Ying. 2011. Learning with support vector machines. Synthesis Lectures on Artificial Intelligence and Machine Learning 5 (1): 1-95. Published online in .pdf in February 2011 by Morgan and Claypool in the United States . doi:==10.2200=S00324ED1V01Y201102AIM010
-
(2011)
Synthesis Lectures on Artificial Intelligence and Machine Learning
, vol.5
, Issue.1
, pp. 1-95
-
-
Campbell, C.1
Ying, Y.2
-
8
-
-
84866599051
-
Recursive data mining for role identification in electronic communications
-
Chaoji, V., A. Hoonlor, and B. K. Szymanski. 2010. Recursive data mining for role identification in electronic communications. International Journal of Hybrid Information Systems 7 (3): 89-100. Also at: http://www.cs.rpi.edu/ ~szymansk/papers/ijhis.09.pdf
-
(2010)
International Journal of Hybrid Information Systems
, vol.7
, Issue.3
, pp. 89-100
-
-
Chaoji, V.1
Hoonlor, A.2
Szymanski, B.K.3
-
9
-
-
84924079216
-
Polonium: Tera-scale graph mining for malware detection
-
Washington DC, July 25
-
Chau, D. H., C. Nachenberg, J. Wilhelm, A. Wright, and C. Faloutsos. 2010. Polonium: Tera-scale graph mining for malware detection. Proceedings of the 2nd workshop on large-scale data mining: theory and applications (LDMTA 2010), Washington, DC, July 25. www.ml.cmu.edu/current-students/DAP-chau.pdf
-
(2010)
Proceedings of the 2nd Workshop on Large-scale Data Mining: Theory and Applications (LDMTA 2010)
-
-
Chau, D.H.1
Nachenberg, C.2
Wilhelm, J.3
Wright, A.4
Faloutsos, C.5
-
10
-
-
33750306345
-
Detecting fraudulent personalities in networks of online auctioneers
-
Knowledge Discovery in Databases: PKDD 2006 - 10th European Conference on Principles and Practice of Knowledge Discovery in Databases, Proceedings
-
Chau, D. H., S. Pandit, and C. Faloutsos. 2006. Detecting fraudulent personalities in networks of online auctioneers. In Proceedings of the European conference on machine learning (ECM) and principles and practice of knowledge discovery in databases (PKDD) 2006, 103-114. Berlin, September 18-22. (Pubitemid 44617716)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4213
, pp. 103-114
-
-
Chau, D.H.1
Pandit, S.2
Faloutsos, C.3
-
11
-
-
34247141976
-
Automated criminal link analysis based on domain knowledge
-
DOI 10.1002/asi.20552
-
Chau, M., J. Schroeder, J. Xu, and H. Chen. 2007. Automated criminal link analysis based on domain knowledge. Journal of the American Society for Information Science and Technology 58 (6): 842-855. (Pubitemid 46587530)
-
(2007)
Journal of the American Society for Information Science and Technology
, vol.58
, Issue.6
, pp. 842-855
-
-
Schroeder, J.1
Xu, J.2
Chen, H.3
Chau, M.4
-
12
-
-
1942500388
-
Crime data mining
-
Chen, H., W. Chung, J. J. Xu, G. Wang, Y. Qin, and M. Chau. 2004. Crime data mining. IEEE Computer 37 (4): 50-56.
-
(2004)
IEEE Computer
, vol.37
, Issue.4
, pp. 50-56
-
-
Chen, H.1
Chung, W.2
Xu, J.J.3
Wang, G.4
Qin, Y.5
Chau, M.6
-
13
-
-
0037290058
-
COPLINK connect: Information and knowledge management for law enforcement
-
DOI 10.1016/S0167-9236(02)00121-5, PII S0167923602001215
-
Chen, H., J. Schroeder, R. Hauck, L. Ridgeway, H. Atabakhsh, H. Gupta, C. Boarman, K. Rasmussen, and A. Clements. 2003. COPLINK connect: Information and knowledge management for law en-forcement. Decision Support Systems 34 (3): 271-285. (Pubitemid 35213959)
-
(2003)
Decision Support Systems
, vol.34
, Issue.3
, pp. 271-285
-
-
Chen, H.1
Schroeder, J.2
Hauck, R.V.3
Ridgeway, L.4
Atabakhsh, H.5
Gupta, H.6
Boarman, C.7
Rasmussen, K.8
Clements, A.W.9
-
14
-
-
0442298972
-
COPLINK managing law enforcement data and knowledge
-
Chen, H., D. Zeng, H. Atabakhsh, W. Wyzga, and J. Schroeder. 2003. COPLINK managing law enforcement data and knowledge. Communications of the ACM 46 (1): 28-34.
-
(2003)
Communications of the ACM
, vol.46
, Issue.1
, pp. 28-34
-
-
Chen, H.1
Zeng, D.2
Atabakhsh, H.3
Wyzga, W.4
Schroeder, J.5
-
15
-
-
34249753618
-
Support-vector networks
-
Cortes, C., and V. Vapnik. 1995. Support-vector networks. Machine Learning 20: 273-277.
-
(1995)
Machine Learning
, vol.20
, pp. 273-277
-
-
Cortes, C.1
Vapnik, V.2
-
17
-
-
0042367634
-
Mining E-mail content for author identification forensics
-
de Vel, O., A. Anderson, M. Corney, and G. Mohay. 2001. Mining E-mail content for author identification forensics. ACM SIGOD Record 30(4): 55-64. (Pubitemid 33720999)
-
(2001)
SIGMOD Record
, vol.30
, Issue.4
, pp. 55-64
-
-
De Vel, O.1
Anderson, A.2
Corney, M.3
Mohay, G.4
-
18
-
-
84904815517
-
Modeling identity in archival collections of email: A preliminary study
-
CEAS 2006, Mountain View, CA, July
-
Elsayed, T., andD.W. Oard. 2006.Modeling identity in archival collections of email: A preliminary study. Presented at the Third Conference on Email and Anti-Spam, CEAS 2006, Mountain View, CA, July 27-28.
-
(2006)
Third Conference on Email and Anti-Spam
, pp. 27-28
-
-
Elsayed, T.1
Oard, D.W.2
-
19
-
-
35048856222
-
Brain MR image segmentation using fuzzy clustering with spatial constraints based on Markov random field theory
-
Medical Imaging and Augmented Reality: Proceedings of the Second International Workshop (MIAR 2004), ed. G.-Z. Yang and T. Jiang Beijing, China, August 19-20, 2004 Berlin: Springer
-
Feng, Y., and W. Chen. 2004. Brain MR image segmentation using fuzzy clustering with spatial constraints based on Markov random field theory. In Medical Imaging and Augmented Reality: Proceedings of the Second International Workshop (MIAR 2004), ed. G.-Z. Yang and T. Jiang, 188-195. Beijing, China, August 19-20, 2004. (Lecture Notes in Computer Science 3150.) Berlin: Springer.
-
(2004)
Lecture Notes in Computer Science
, vol.3150
, pp. 188-195
-
-
Feng, Y.1
Chen, W.2
-
23
-
-
80755127844
-
Discovery, analysis and monitoring of hidden social networks and their evolution
-
Boston, May
-
Goldberg, M., M. Hayvanovych, A. Hoonlor, S. Kelley, M. Magdon-Ismail, K. Mertsalov, B. Szymanski, and W. Wallace. 2008. Discovery, analysis and monitoring of hidden social networks and their evolution. IEEE Homeland Security Technologies Conference, 1-6. Boston, May.
-
(2008)
IEEE Homeland Security Technologies Conference
, pp. 1-6
-
-
Goldberg, M.1
Hayvanovych, M.2
Hoonlor, A.3
Kelley, S.4
Magdon-Ismail, M.5
Mertsalov, K.6
Szymanski, B.7
Wallace, W.8
-
25
-
-
0016494374
-
The application of link analysis to police intelligence
-
Harper, W. R., and D. H. Harris. 1975. The application of link analysis to police intelligence. Human Factors 17 (2): 157-164.
-
(1975)
Human Factors
, vol.17
, Issue.2
, pp. 157-164
-
-
Harper, W.R.1
Harris, D.H.2
-
26
-
-
0036500849
-
COPLINK concept space: An application for criminal intelligence analysis
-
Hauck, R. V., H. Atabakhsh, P. Ongvasith, H. Gupta, and H. Chen. 2002. COPLINK concept space: An application for criminal intelligence analysis. IEEE Computer 35 (3): 30-37.
-
(2002)
IEEE Computer
, vol.35
, Issue.3
, pp. 30-37
-
-
Hauck, R.V.1
Atabakhsh, H.2
Ongvasith, P.3
Gupta, H.4
Chen, H.5
-
27
-
-
56549084673
-
-
Department of Computer Science, Purdue University, West Lafayette, Indiana
-
Idika, N., and A. P. Mathur. 2007. A survey of malware detection techniques (Technical Report). Department of Computer Science, Purdue University, West Lafayette, Indiana.
-
(2007)
A Survey of Malware Detection Techniques (Technical Report)
-
-
Idika, N.1
Mathur, A.P.2
-
29
-
-
74349130571
-
Link analysis of fuel laundering scams and implications of results for scheme understanding and prosecutor strategy
-
ed. G. Governatori July 25. Amsterdam: IOS Press
-
Jȩdrzejek, C., M. Falkowski, and M. Smolenski. 2009. Link analysis of fuel laundering scams and implications of results for scheme understanding and prosecutor strategy. In Proceedings of legal knowledge and information systems: JURIX 2009, ed. G. Governatori, 79-88. July 25. Amsterdam: IOS Press.
-
(2009)
Proceedings of Legal Knowledge and Information Systems: JURIX 2009
, pp. 79-88
-
-
Jȩdrzejek, C.1
Falkowski, M.2
Smolenski, M.3
-
30
-
-
33645996012
-
Image denoising using complex wavelets and Markov prior models
-
Image analysis and recognition: Proceedings of the 2nd international conference (ICIAR 2005) ed. M. Kamel and A. Campilho,73-80 Toronto Canada September Berlin Springer
-
Jin, F., P. Fieguth, and L. Winger. 2005. Image denoising using complex wavelets and Markov prior models. In Image analysis and recognition: Proceedings of the 2nd international conference (ICIAR 2005), ed. M. Kamel and A. Campilho, 73-80. Toronto, Canada, September 28-30. (Lecture Notes in Computer Science, 3656.) Berlin: Springer.
-
(2005)
Lecture Notes in Comuter Science
, vol.3656
, pp. 28-30
-
-
Jin, F.1
Fieguth, P.2
Winger, L.3
-
31
-
-
28844486722
-
Computer aided tracking and characterization of homicides and sexual assaults (CATCH)
-
Kangas, L. J., K. M. Terrones, R. D. Keppel, and R. D. La Moria. 2003. Computer aided tracking and characterization of homicides and sexual assaults (CATCH). In Mena (2003), 364-375.
-
(2003)
Mena
, pp. 364-375
-
-
Kangas, L.J.1
Terrones, K.M.2
Keppel, R.D.3
La Moria, R.D.4
-
32
-
-
84866620050
-
-
Farnham, England: Ashgate Publishing
-
Kaptein, H., H. Prakken, and B. Verheij, eds. 2009. Legal Evidence and Proof: Statistics, Stories, Logic, Applied Legal Philosophy Series. Farnham, England: Ashgate Publishing.
-
(2009)
Legal Evidence and Proof: Statistics, Stories, Logic, Applied Legal Philosophy Series
-
-
Kaptein, H.1
Prakken, H.2
Verheij, B.3
-
33
-
-
84947923186
-
A Markov random field image segmentation model using combined color and texture features
-
Computer Analysis of Images and Patterns: Proceedings of the 9th International Conference (CAIP 2001),ed. W. Skarbek, 547-554. Warsaw, Poland, September Berlin: Springer
-
Kato, Z., and T.-C. Pong. 2001. A Markov random field image segmentation model using combined color and texture features. In Computer Analysis of Images and Patterns: Proceedings of the 9th International Conference (CAIP 2001), ed. W. Skarbek, 547-554. Warsaw, Poland, September 5-7. (Lecture Notes in Computer Science, 2124.) Berlin: Springer.
-
(2001)
Lecture Notes in Computer Science
, vol.2124
, pp. 5-7
-
-
Kato, Z.1
Pong, T.-C.2
-
36
-
-
2942674608
-
Survey of fraud detection techniques
-
Taipei, Taiwan
-
Kou, Y., C. T. Lu, S. Sirwongwattana, and Y. P. Huang. 2004. Survey of fraud detection techniques. In Proceedings of the 2004 international conference on networking, sensing, and control, 749-754. Taipei, Taiwan.
-
(2004)
Proceedings of the 2004 International Conference on Networking, Sensing, and Control
, pp. 749-754
-
-
Kou, Y.1
Lu, C.T.2
Sirwongwattana, S.3
Huang, Y.P.4
-
37
-
-
70449530555
-
Finding excuses with ALIBI: Alternative plans that are deontically more defensible
-
Lisbon, September 1989. Also in Computers and Artificial Intelligence, 10 4) 297-325 and in Information technology and society Theory uses impacts ed J Lopes Alves Lisbon : APDC and SPF
-
Kuflik, T. S., E. Nissan, and G. Puni. 1989. Finding excuses with ALIBI: Alternative plans that are deontically more defensible. In Proceedings of the international symposium on communication, meaning and knowledge vs. information technology, Lisbon, September 1989. Also in Computers and Artificial Intelligence, 10 (4): 297-325, and in Information technology and society: Theory, uses, impacts, ed. J. Lopes Alves, 484-510. Lisbon : APDC and SPF (1992).
-
(1989)
Proceedings of the International Symposium on Communication, Meaning and Knowledge Vs. Information Technology
, pp. 484-510
-
-
Kuflik, T.S.1
Nissan, E.2
Puni, G.3
-
39
-
-
85087291702
-
Mathematical MRF models
-
ed. S. Z. Li (Advances in Computer Vision and Pattern Recognition series; originally published in the series: Computer Science Workbench, 3rd ed.) Tokyo: Springer-Verlag ,2001
-
Li, S. Z. 2009. Mathematical MRF models. In Markov Random Field Modeling in Image Analysis, ed. S. Z. Li, 1-28 (Advances in Computer Vision and Pattern Recognition series; originally published in the series: Computer Science Workbench, 3rd ed.) Tokyo: Springer-Verlag (2001).
-
(2009)
Markov Random Field Modeling in Image Analysis
, pp. 1-28
-
-
Li, S.Z.1
-
40
-
-
0347193969
-
-
Heidelberg: Physical-Verlag (of Springer)
-
MacCrimmon, M., P. Tillers, eds. 2002. The Dynamics of Judicial Proof: Computation, Logic, and Common Sense Studies in Fuzziness and Soft Computing, vol. 94. Heidelberg: Physical-Verlag (of Springer).
-
(2002)
The Dynamics of Judicial Proof: Computation, Logic, and Common Sense Studies in Fuzziness and Soft Computing
, vol.94
-
-
MacCrimmon, M.1
Tillers, P.2
-
42
-
-
0346568563
-
Formal approaches to legal evidence. Special issue
-
Martino, A. A., and E. Nissan, eds. 2001. Formal approaches to legal evidence. Special issue, Artificial Intelligence and Law 9 (2-3): 85-224.
-
(2001)
Artificial Intelligence and Law
, vol.9
, Issue.2-3
, pp. 85-224
-
-
Martino, A.A.1
Nissan, E.2
-
44
-
-
85181551245
-
-
Ch. 17 Image fusion: theories, techniques and applications. H. B. Mitchell. Berlin: Springer. doi:==10.1007=978-3-642-11216-4-17
-
Mitchell, H. B. 2010. Markov random fields. Ch. 17, 205-209 In Image fusion: theories, techniques and applications. H. B. Mitchell. Berlin: Springer. doi:==10.1007=978-3-642-11216-4-17
-
(2010)
Markov Random Fields
, pp. 205-209
-
-
Mitchell, H.B.1
-
46
-
-
32344439564
-
Using relational knowledge discovery to prevent securities fraud
-
DOI 10.1145/1081870.1081922, KDD-2005 - Proceedings of the 11th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
-
Neville, J., O. Simsek, D. Jensen, J. Komoroske, K. Palmer, and H. Goldberg. 2005. Using relational knowledge discovery to prevent securities fraud. In Proceedings of the 11th ACM SIGKDD international conference on knowledge discovery and data mining (KDD'05), 449-458. Chicago, Illinois, August 21-24. New York: ACM Press. (Pubitemid 43218307)
-
(2005)
Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 449-458
-
-
Neville, J.1
Simsek, O.2
Jensen, D.3
Komoroske, J.4
Palmer, K.5
Goldberg, H.6
-
49
-
-
84866627792
-
Software, formal models, and artificial intelligence for legal evidence
-
Nissan, E., and A. A. Martino, eds. 2001. Software, formal models, and artificial intelligence for legal evidence. Computing and Informatics (special issue) 20 (6): 509-656.
-
(2001)
Computing and Informatics (Special Issue)
, vol.20
, Issue.6
, pp. 509-656
-
-
Nissan, E.1
Martino, A.A.2
-
50
-
-
85011452114
-
Building blocks for an artificial intelligence framework in the field of legal evidence
-
(4=5): 233-411, 34 (6=7)
-
Nissan, E., and A. A. Martino, eds. 2003. Building blocks for an artificial intelligence framework in the field of legal evidence. Cybernetics and Systems (special issue in two parts) 34 (4=5): 233-411, 34 (6=7): 413-583.
-
(2003)
Cybernetics and Systems (Special Issue in Two Parts)
, vol.34
, pp. 413-583
-
-
Nissan, E.1
Martino, A.A.2
-
51
-
-
2442484762
-
The construction of judicial proof: A challenge for artificial intelligence modelling
-
Nissan, E., and A. A. Martino, eds. 2004. The construction of judicial proof: A challenge for artificial intelligence modelling. Applied Artificial Intelligence (special issue) 18(3=4): 183-393.
-
(2004)
Applied Artificial Intelligence (Special Issue)
, vol.18
, Issue.3-4
, pp. 183-393
-
-
Nissan, E.1
Martino, A.A.2
-
52
-
-
35348860262
-
Netprobe: A fast and scalable system for fraud detection in online auction networks
-
DOI 10.1145/1242572.1242600, 16th International World Wide Web Conference, WWW2007
-
Pandit, S., D. H. Chau, S. Wang, and C. Faloutsos. 2007. NetProbe: A fast and scalable for fraud detection in online auction networks. In WWW 2007: Proceedings of the 16th International Conference on World Wide Web, 201-210. Alberta, Canada. New York, NY: ACM. (Pubitemid 47582250)
-
(2007)
16th International World Wide Web Conference, WWW2007
, pp. 201-210
-
-
Pandit, S.1
Chau, D.H.2
Wang, S.3
Faloutsos, C.4
-
53
-
-
37149053967
-
A comprehensive survey of data-mining-based fraud detection research
-
Monash University, Clayton, Victoria, Australia
-
Phua, C., V. Lee, K. Smith-Miles, and R. Gayler. 2005. A comprehensive survey of data-mining-based fraud detection research. Clayton School of Information Technology, Monash University, Clayton, Victoria, Australia. http://clifton.phua.googlepages.com
-
(2005)
Clayton School of Information Technology
-
-
Phua, C.1
Lee, V.2
Smith-Miles, K.3
Gayler, R.4
-
54
-
-
34247141976
-
Automated criminal link analysis based on domain knowledge
-
DOI 10.1002/asi.20552
-
Schroeder, J., J. Xu, H. Chen, and M. Chau. 2007. Automated criminal link analysis based on domain knowledge. Journal of American Society for Information Science and Technology 58 (6): 842-855. (Pubitemid 46587530)
-
(2007)
Journal of the American Society for Information Science and Technology
, vol.58
, Issue.6
, pp. 842-855
-
-
Schroeder, J.1
Xu, J.2
Chen, H.3
Chau, M.4
-
55
-
-
0034838197
-
Data mining methods for detection of new malicious executables
-
Schultz, M., E. Eskin, E. Zadok, and S. Stolfo. 2001. Data mining methods for detection of new malicious executables. Presented at the 2001 IEEE Symposium on Security and Privacy, 38-49. (Pubitemid 32882625)
-
(2001)
Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy
, pp. 38-49
-
-
Schultz, M.G.1
Eskin, E.2
Zadok, E.3
Stolfo, S.J.4
-
58
-
-
15944400613
-
Recursive data mining for masquerade detection and author identification
-
Proceedings fron the Fifth Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC
-
Szymanski, B., and Y. Zhang. 2004. Recursive data mining for masquerade detection and author identification. In Proceedings of the 5th IEEE system, man and cybernetics information assurance (SMC IA) workshop, 424-431. West Point, NY, June. (Pubitemid 40442822)
-
(2004)
Proceedings fron the Fifth Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC
, pp. 424-431
-
-
Szymanski, B.K.1
Zhang, Y.2
-
60
-
-
84971733614
-
Explanatory coherence
-
Commentaries and rioste u to 502
-
Thagard, P. 1989. Explanatory coherence. Behavioural and Brain Sciences 12 (3): 435-467. (Commentaries and riposte up to 502.)
-
(1989)
Behavioural and Brain Sciences
, vol.12
, Issue.3
, pp. 435-467
-
-
Thagard, P.1
-
62
-
-
70449983750
-
Discovery of email communication networks from the Enron corpus with a genetic algorithm using social network analysis
-
Trondheim, Norway, May
-
Wilson, G., and W. Banzhaf. 2009. Discovery of email communication networks from the Enron corpus with a genetic algorithm using social network analysis. In Proceedings of the 11th conference on evolutionary computation, 3256-3263. Trondheim, Norway, May 18-21.
-
(2009)
Proceedings of the 11th Conference on Evolutionary Computation, 3256-3263
, pp. 18-21
-
-
Wilson, G.1
Banzhaf, W.2
-
63
-
-
25444517581
-
Visualizing criminal relationships: Comparison of a hyperbolic tree and a hierarchical list
-
DOI 10.1016/j.dss.2004.02.006, PII S0167923604001125
-
Xiang, Y., M. Chau, H. Atabakhsh, and H. Chen. 2005. Visualizing criminal relationships: Comparisons of a hyperbolic tree and a hierarchical list. Decision Support System 41:69-83. (Pubitemid 41375566)
-
(2005)
Decision Support Systems
, vol.41
, Issue.1
, pp. 69-83
-
-
Xiang, Y.1
Chau, M.2
Atabakhsh, H.3
Chen, H.4
-
64
-
-
4544224894
-
Fighting organized crimes: Using shortest-path algorithms to identify associations in criminal networks
-
Xu, J. J., and H. Chen. 2004. Fighting organized crimes: using shortest-path algorithms to identify associations in criminal networks. Decision Support Systems 38:473-487.
-
(2004)
Decision Support Systems
, vol.38
, pp. 473-487
-
-
Xu, J.J.1
Chen, H.2
-
65
-
-
0141695638
-
Understanding belief propagation and its generalizations
-
ed. G. Lakemeyer and B. Nebel. San Francisco, CA: Morgan Kaufmann. (Previously, Technical Report TR-2001-2022, Mitsubishi Electric Research, 2001.)
-
Yedidia, J. S., W. T. Freeman, and Y. Weiss. 2003. Understanding belief propagation and its generalizations. In Exploring Artificial Intelligence in the New Millennium, ed. G. Lakemeyer and B. Nebel, 239-269. San Francisco, CA: Morgan Kaufmann. (Previously, Technical Report TR-2001-22, Mitsubishi Electric Research, 2001.)
-
(2003)
Exploring Artificial Intelligence in the New Millennium
, pp. 239-269
-
-
Yedidia, J.S.1
Freeman, W.T.2
Weiss, Y.3
|